A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage

There has been considerable recent interest in “cloud storage” wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is inde...

Full description

Bibliographic Details
Main Authors: Paterson Maura B., Stinson Douglas R., Upadhyay Jalaj
Format: Article
Language:English
Published: De Gruyter 2013-10-01
Series:Journal of Mathematical Cryptology
Subjects:
Online Access:https://doi.org/10.1515/jmc-2013-5002
id doaj-228165b1074c41f482deef8289a0c68e
record_format Article
spelling doaj-228165b1074c41f482deef8289a0c68e2021-09-06T19:40:44ZengDe GruyterJournal of Mathematical Cryptology1862-29761862-29842013-10-017318321610.1515/jmc-2013-5002A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storagePaterson Maura B.0Stinson Douglas R.1Upadhyay Jalaj2Department of Economics, Mathematics and Statistics, Birkbeck, University of London, Malet Street, London WC1E 7HX, UKDavid R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, CanadaDavid R. Cheriton School of Computer Science, University of Waterloo, Waterloo, Ontario, N2L 3G1, CanadaThere has been considerable recent interest in “cloud storage” wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover or retrieve the file given any “proving algorithm” that has a sufficiently high success probability. This paper treats proof-of-retrievability schemes in the model of unconditional security, where an adversary has unlimited computational power. In this case retrievability of the file can be modelled as error-correction in a certain code. We provide a general analytical framework for such schemes that yields exact (non-asymptotic) reductions that precisely quantify conditions for extraction to succeed as a function of the success probability of a proving algorithm, and we apply this analysis to several archetypal schemes. In addition, we provide a new methodology for the analysis of keyed POR schemes in an unconditionally secure setting, and use it to prove the security of a modified version of a scheme due to Shacham and Waters [Lecture Notes in Comput. Sci. 5350, Springer (2008), 90–107] under a slightly restricted attack model, thus providing the first example of a keyed POR scheme with unconditional security. We also show how classical statistical techniques can be used to evaluate whether the responses of the prover are accurate enough to permit successful extraction. Finally, we prove a new lower bound on storage and communication complexity of POR schemes.https://doi.org/10.1515/jmc-2013-5002proof-of-retrievabilitycloud storageerror-correcting code
collection DOAJ
language English
format Article
sources DOAJ
author Paterson Maura B.
Stinson Douglas R.
Upadhyay Jalaj
spellingShingle Paterson Maura B.
Stinson Douglas R.
Upadhyay Jalaj
A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
Journal of Mathematical Cryptology
proof-of-retrievability
cloud storage
error-correcting code
author_facet Paterson Maura B.
Stinson Douglas R.
Upadhyay Jalaj
author_sort Paterson Maura B.
title A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
title_short A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
title_full A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
title_fullStr A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
title_full_unstemmed A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
title_sort coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage
publisher De Gruyter
series Journal of Mathematical Cryptology
issn 1862-2976
1862-2984
publishDate 2013-10-01
description There has been considerable recent interest in “cloud storage” wherein a user asks a server to store a large file. One issue is whether the user can verify that the server is actually storing the file, and typically a challenge-response protocol is employed to convince the user that the file is indeed being stored correctly. The security of these schemes is phrased in terms of an extractor which will recover or retrieve the file given any “proving algorithm” that has a sufficiently high success probability. This paper treats proof-of-retrievability schemes in the model of unconditional security, where an adversary has unlimited computational power. In this case retrievability of the file can be modelled as error-correction in a certain code. We provide a general analytical framework for such schemes that yields exact (non-asymptotic) reductions that precisely quantify conditions for extraction to succeed as a function of the success probability of a proving algorithm, and we apply this analysis to several archetypal schemes. In addition, we provide a new methodology for the analysis of keyed POR schemes in an unconditionally secure setting, and use it to prove the security of a modified version of a scheme due to Shacham and Waters [Lecture Notes in Comput. Sci. 5350, Springer (2008), 90–107] under a slightly restricted attack model, thus providing the first example of a keyed POR scheme with unconditional security. We also show how classical statistical techniques can be used to evaluate whether the responses of the prover are accurate enough to permit successful extraction. Finally, we prove a new lower bound on storage and communication complexity of POR schemes.
topic proof-of-retrievability
cloud storage
error-correcting code
url https://doi.org/10.1515/jmc-2013-5002
work_keys_str_mv AT patersonmaurab acodingtheoryfoundationfortheanalysisofgeneralunconditionallysecureproofofretrievabilityschemesforcloudstorage
AT stinsondouglasr acodingtheoryfoundationfortheanalysisofgeneralunconditionallysecureproofofretrievabilityschemesforcloudstorage
AT upadhyayjalaj acodingtheoryfoundationfortheanalysisofgeneralunconditionallysecureproofofretrievabilityschemesforcloudstorage
AT patersonmaurab codingtheoryfoundationfortheanalysisofgeneralunconditionallysecureproofofretrievabilityschemesforcloudstorage
AT stinsondouglasr codingtheoryfoundationfortheanalysisofgeneralunconditionallysecureproofofretrievabilityschemesforcloudstorage
AT upadhyayjalaj codingtheoryfoundationfortheanalysisofgeneralunconditionallysecureproofofretrievabilityschemesforcloudstorage
_version_ 1717767876016865280